Sciweavers

8499 search results - page 1693 / 1700
» network 2007
Sort
View
SDM
2007
SIAM
89views Data Mining» more  SDM 2007»
13 years 9 months ago
Preventing Information Leaks in Email
The widespread use of email has raised serious privacy concerns. A critical issue is how to prevent email information leaks, i.e., when a message is accidentally addressed to non-...
Vitor R. Carvalho, William W. Cohen
WALCOM
2007
IEEE
151views Algorithms» more  WALCOM 2007»
13 years 8 months ago
Base Station Placement Problem on the Boundary of a Convex Region
Due to the recent growth in the demand of mobile communication services in several typical environments, the development of efficient systems for providing specialized services ha...
Gautam K. Das, Sasanka Roy, Sandip Das, Subhas C. ...
CIDM
2007
IEEE
13 years 7 months ago
SSM : A Frequent Sequential Data Stream Patterns Miner
Data stream applications like sensor network data, click stream data, have data arriving continuously at high speed rates and require online mining process capable of delivering c...
C. I. Ezeife, Mostafa Monwar
AC
2008
Springer
13 years 7 months ago
Computing with RFID- Drivers, Technology and Implications
Radio Frequency Identification or simply rfid has come to be an integral part of modern computing. Rfid is notable in that it is the first practical technology to tightly couple p...
George Roussos
BMCBI
2008
140views more  BMCBI 2008»
13 years 7 months ago
GORouter: an RDF model for providing semantic query and inference services for Gene Ontology and its associations
Background: The most renowned biological ontology, Gene Ontology (GO) is widely used for annotations of genes and gene products of different organisms. However, there are shortcom...
Qingwei Xu, Yixiang Shi, Qiang Lu, Guo-qing Zhang,...
« Prev « First page 1693 / 1700 Last » Next »